Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
eqig unpacked.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
eqig unpacked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
eqig.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
eqig.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
output.1301364 unpacked.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
output.1301364 unpacked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
output.1301364.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
output.1301364.exe
Resource
win10v2004-20240508-en
General
-
Target
eqig unpacked.exe
-
Size
255KB
-
MD5
7bc463a32d6c0fb888cd76cc07ee69b5
-
SHA1
81086a9559af3edc889f1c4c720460ebf49f8ef1
-
SHA256
09e9fb8beb798f2c17a311d59c0a44d9e815d6cad8ea4feadd77a66d4d3706b5
-
SHA512
7657ca1c29025d0e40978d775e891f79c015cd6cb4dd44aa63cf2f6ef036491eff2b56511616d3678fac8f9148106b93cb877637a496c86d8d87c61a277b9102
-
SSDEEP
6144:8fK9TB2jX+3PUdyj4oVDyLiMRgxnnMACDUprIvxo:8fK9ToaUd0PEi/RnDvwx
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1616 Taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1616 Taskmgr.exe Token: SeSystemProfilePrivilege 1616 Taskmgr.exe Token: SeCreateGlobalPrivilege 1616 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe 1616 Taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1616 4804 launchtm.exe 82 PID 4804 wrote to memory of 1616 4804 launchtm.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eqig unpacked.exe"C:\Users\Admin\AppData\Local\Temp\eqig unpacked.exe"1⤵PID:2112
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1616
-